bring your own device

Security Concerns for Personal Devices in the Workplace (BYOD)

Russell W. Gilmore, CISSP, CISM, EnCE Security Planning, Security Policy and Procedure Development, Uncategorized

We first addressed personal devices in the workplace back in 2018. That seems like such a long time ago now. With record numbers of employees now working from home due to COVID, how should we think about personal devices in the workplace? What are some of the security concerns that you should address? When work occurs on personal devices, how …

Technology in My Divorce

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Mobile Forensics

The standard issues involved with a divorce or separation are most often very difficult. In the past decade I have seen these difficult situations made even more difficult because of technology. Text messages, emails, smartphones, and other technology are relevant in many of the cases we see. As computer forensics consultants, we are asked to check computers for keylogging software …

Computer Forensics: What is metadata?

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics

What is metadata and why is it important in a computer forensics investigation? A brief definition or explanation of metadata is “data about data.” What does that exactly mean? Data is the file. Data is the Word document, the Excel document, or any other user-created document on the computer. Meta is information about that document. This can include where it’s …

two-factor authentication

Two-Factor Authentication

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics

What is two-factor authentication? Two-factor authentication is a second level of authentication for you the user to be able to access your account. The first level of authentication is your user ID and password. What that means is that anybody with your user ID and password can log into your web-based accounts whether it’s your email account, Office 365, your …

Remote Work Involves These 3 Cyber Security Risks

Russell W. Gilmore, CISSP, CISM, EnCE News

A recent online Forbes article written by Carrie Rubinstein pointed out 3 Cyber Security Risks created by employees working remotely. Prior to COVID-19, the Bureau of Labor Statistics identified that approximately 29 percent of Americans were able to work remotely. As a result of the implementation of safety measures related to COVID-19, employers are requiring more of their staff to …

remote monitoring

Remote Monitoring Software and COVID-19

Russell W. Gilmore, CISSP, CISM, EnCE News, Security Policy and Procedure Development

We find ourselves in very unique times. As of April 3, 2020, there are 311 million people in at least 41 states, three counties, eight cities, the District of Columbia and Puerto Rico being urged to stay home. This rapid change has put many employers in a position to allow employees to work from home. Because of that, employers are …

phishing scams

Phishing Scams and SMShishing Scams

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Mobile Forensics

In today’s technology-based world, phishing email scams have become commonplace. Whether simple or complex these scams are often effective. Both companies and individuals fall victim to phishing scams leading to the loss of billions of dollars annually. Phishing scams typically involves a cybercriminal impersonating a legitimate company or individual. They attempt to gain access to personal or private information such …

Digital Delinquency: How to Respond to Employee Data Theft, Cyberbullying, and More

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Intellectual Property, Mobile Forensics, Theft, Embezzlement, and Fraud

Employers today are armed with more technology than ever before—with state-of-the art tools that improve productivity, enhance communication, and ultimately help to boost our bottom lines. But the more we rely on digital tools to create, store, and share data, the more vulnerable we become to employee digital data theft. Similarly, digital methods of communication can often open the door …

dark web login article

Stolen Login Credentials on the Dark Web

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Mobile Forensics

Just because the company you work for is not a Fortune 500 company does not mean your credentials were not stolen at some point. According to an article in Security Magazine, 21 million login credentials stolen from Fortune 500 companies were found on the Dark Web. Bleepingcomputer.com reported that only 4.9 million of the passwords were unique. Just imagine what …

data erased

Employee Deception: Too Little, Too Late

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Electronic Data Recovery, Embezzlement, Fraud, Theft, Theft, Embezzlement, and Fraud

Protus3 conducts a wide variety of corporate investigations related to employee deception. Some of the more common issues involve harassment complaints or theft of data. Sometimes these issues appear while the employee is still with the company. In other cases, the employee deception does not come to light for weeks or months after they have left the company. Even when …